Is the Cloud Ready to Support Your Voice?

Challenge: Today’s communication systems are complicated. Organizations of all sizes need systems requiring licensing, implementation, and personnel to manage:  • Personal Communications (Skype, Jabber, etc.) • Group Conferencing (BlueJeans, HangOuts, etc.) • Phone PBX (Avaya, Cisco, ShoreTel, etc) Solution:  Isn’t there an easier way to manage all of this?  The answer….possibly. Let’s explore turnkey capabilities many [...]

By | 2017-06-05T09:21:03+00:00 June 28th, 2017|Comments Off on Is the Cloud Ready to Support Your Voice?

Modern Authentication Part 2 – How the Modern Authentication Protocol Works

This is part two of a two part series on Modern Authentication and the Modern Authentication Protocol. Part one explained what Modern Authentication is and why organizations would or would not want to implement it. You can read part one here. How the Modern Authentication Protocol Works Once Modern Authentication is enabled a user will [...]

By | 2018-12-18T11:56:58+00:00 May 12th, 2017|Infrastructure Services|Comments Off on Modern Authentication Part 2 – How the Modern Authentication Protocol Works

Office 365 & Deep Dish Pizza – Saving your Organization from a Food Coma

How could something so delicious cause Office 365 productivity, security and legal issues?  Many organizations are unwittingly under attack from poor lunch choices (tasty, but not necessarily good for productivity). Office 365 can't help you make smarter food selections, but it does have some features that can actually protect your organization from the effects of a [...]

By | 2018-12-18T11:57:29+00:00 April 17th, 2017|Collaboration, Office 365|Comments Off on Office 365 & Deep Dish Pizza – Saving your Organization from a Food Coma

Modern Authentication – Part 1

This is part one of a two part series. You can read part two here. What is Modern Authentication? Modern Authentication brings Active Directory Authentication Library (ADAL)-based sign-in to Office client apps across platforms. This enables sign-in features such as Multi-Factor Authentication (MFA), SAML-based third-party Identity Providers with Office client applications, smart card and certificate-based [...]

By | 2018-12-18T11:57:52+00:00 April 5th, 2017|Infrastructure Services|Comments Off on Modern Authentication – Part 1

Securing the Internet of Things (IoT)

Through our blogs and recent events, we have been engaging in the conversation of how the Internet of Things (IoT) can transform your business and enable you to capitalize on new opportunities by harnessing the data of connected "things." However, this also brings about security concerns including secure management of IoT devices, as well as [...]

By | 2018-12-18T11:00:56+00:00 March 8th, 2017|Business Intelligence, Collaboration|Comments Off on Securing the Internet of Things (IoT)

Untapped Office 365 Features

The pace of change in the cloud can be overwhelming. That’s why we took the time on January 10th to help educate Office 365 customers. During our hour long webinar, we detailed some of the lesser-known and unheralded Office 365 features that can provide significant value to Microsoft customers. The most important part about this: [...]

By | 2018-12-18T10:49:16+00:00 February 6th, 2017|Collaboration, Office 365|Comments Off on Untapped Office 365 Features

Cloud Economics: A Managed Services Provider is the missing link

With cloud computing becoming more popular for all sized businesses, it is important to know how to maximize your investment while also reducing your organization's risk. Our Managed Services can help you accomplish tracking your ROI and understand how you can continue to limit security risks. Cloud savings--are they real? Cloud computing is not going anywhere [...]

By | 2018-12-18T12:26:28+00:00 January 13th, 2017|Managed Services|Comments Off on Cloud Economics: A Managed Services Provider is the missing link

Multiple Office 365 Tenant Considerations

Are you considering migrating your company to multiple Office 365 tenants?  This is a decision that should be taken seriously and given much consideration.  The primary reason why organizations should consider multiple tenants is when there is a global end-user base. Office 365 tenants are based in the confines of a single region, and an [...]

By | 2016-12-19T11:16:00+00:00 December 19th, 2016|Cloud Architecture|Comments Off on Multiple Office 365 Tenant Considerations

Azure Analysis Services: The Missing Piece to a Complete BI Solution in Azure

On October 25, 2016, Microsoft announced the public preview of Azure Analysis Services which enables an entirely Azure-based BI solution and provides the ability to analyze your company’s data to every user, not just IT and data scientists. The Case for a Semantic Layer in Your BI Solution To understand the benefits of leveraging Azure [...]

By | 2018-12-18T11:01:37+00:00 December 7th, 2016|Business Intelligence, Collaboration|Comments Off on Azure Analysis Services: The Missing Piece to a Complete BI Solution in Azure

Securing Emails with Office 365 Message Encryption (OME)

Sharing sensitive information is problematic for many organizations.  Email encryption is one way to address the problem.  Office 365 Message Encryption (OME) is a feature that when leveraged, can prevent certain emails from being accessible even at-rest in a mailbox. Determining what should be encrypted Most organizations have a policy that dictates what type of communications [...]

By | 2018-12-18T11:59:52+00:00 November 23rd, 2016|Collaboration, Office 365|Comments Off on Securing Emails with Office 365 Message Encryption (OME)